Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 1059 from your keywords: subject="Na"
First Page Previous 36 37 38 39 40 Next Last Page
cover
Critical infrastructure: homeland security and emergency preparedness
Comment Share
Radvanovsky, RobertMcDougall, Allan

Contents: ch. 1 Introduction to Critical Infrastructure Assurance and Protection 1.1.Introduction 1.2.What Is Critical Infrastructure? 1.3.What Is the Private Sector? 1.4.What Is the Public Sector? 1.5.What Is CIP? 1.6.What Is CIA? 1.7.What Are Public-Private Partnerships? 1.8.Critical Infrastructure Functions 1.9.Evolution of Critical Infrastructure ch. 2 Demand, Capacity, Fragili…

Edition
Third Edition
ISBN/ISSN
9781466503458
Collation
xv, 257 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.34 RAD c
Availability1
Add to basket
MARC DownloadCite
cover
E-discovery: an introduction to digital evidence
Comment Share
Amelia, PhillipsGodfrey, RonaldSteuart, ChristopherBrown, Christine

Ch 1 Introduction to e-discovery and digital evidence Ch 2 A brief history of e-discovery Ch 3 E-discovery planning and tools Ch 4 Experts: the right person for the right job Ch 5 Digital evidence case flow Ch 6 Case study: from beginning to trial Ch 7 Information governance and litigation preparedness Ch 8 Researching e-discovery case law Ch 9 The future of e-discovery

Edition
--
ISBN/ISSN
9781111310646
Collation
xvi, 254 hal.; ilus.; 24 cm
Series Title
--
Call Number
347.73 PHI e
Availability1
Add to basket
MARC DownloadCite
cover
Fundamentals of technology project management
Comment Share
Garton, ColleenMcCulloch, Erika

Table of contents: Introduction 1. Concepts of Project Management 2. Project Management Methodologies 3. Project Initiation 4. Advancing Beyond the Greenlight 5. The Project Plan &​ Project Approach 6. Project Kick-Off 7. Project Design 8. Creating The Project Schedule 9. Project Development 10. Managing Obstacles and Risks 11. Managing Communication 12. Integration and Testing …

Edition
2nd Edition
ISBN/ISSN
9781583473399
Collation
xxiii, 705 hal.; ilus.; 23 cm
Series Title
--
Call Number
658.404 GAR f
Availability1
Add to basket
MARC DownloadCite
cover
Network flow analysis
Comment Share
Lucas, Michael W.

CONTENTS INTRODUCTION NETWORK ADMINISTRATION AND NETWORK MANAGEMENT NETWORK MANAGEMENT TOOLS ENOUGH GRIPING : WHAT’S THE SOLUTION ? FLOW-TOOLS AND ITS PREREQUISITES FLOWS AND THIS BOOK 1 FLOW FUNDAMENTALS WHAT IS A FLOW ? FLOW SYSTEM ARCHITECTURE THE HISTORY OF NETWORK FLOW FLOWS IN THE REAL WORLD FLOW EXPORT AND TIMEOUTS PACKET-SAMPLED FLOWS 2 COLLECTORS AND …

Edition
--
ISBN/ISSN
9781593272036
Collation
xiii, 208 hlm.; ilus.; 24 cm
Series Title
--
Call Number
658.4032 LUC m
Availability2
Add to basket
MARC DownloadCite
cover
Managing an information security and privacy awareness and training program
Comment Share
Herold, Rebecca

Table of Contents 1. Brief History of Corporate Information Security and Privacy Awareness and Training Once Upon a Time Welcome to the Information Age Information Security and Privacy Education Current Challenges Bring Changes in Professional Education 2. Why Training and Awareness Are Important Regulatory Requirements Compliance Customer Trust and Satisfaction …

Edition
2nd Edition
ISBN/ISSN
9781439815458
Collation
xxx, 538 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.478 HER m
Availability1
Add to basket
MARC DownloadCite
cover
Microsoft Windows Security Essentials
Comment Share
Gibson, Darril

Table of contents Introduction. Chapter 1 Understanding Core Security Principles. Chapter 2 Understanding Malware and Social Engineering. Chapter 3 Understanding User Authentication. Chapter 4 Securing Access with Permissions. Chapter 5 Using Audit Policies and Network Auditing. Chapter 6 Protecting Clients and Servers. Chapter 7 Protecting a Network. Chapter 8 Understanding Wireless S…

Edition
--
ISBN/ISSN
9781118016848
Collation
xxiv, 312 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GIB m
Availability1
Add to basket
MARC DownloadCite
cover
Pembinaan organisasi: proses diagnosa dan intervensi
Comment Share
Miftah Thoha

Edition
-
ISBN/ISSN
9794211915
Collation
xiv, 224 hlm.; 21 cm.
Series Title
-
Call Number
658.1 MIF p

Edition
-
ISBN/ISSN
9794211915
Collation
xiv, 224 hlm.; 21 cm.
Series Title
-
Call Number
658.1 MIF p
Availability1
Add to basket
MARC DownloadCite
cover
Oracle 11g Anti-hacker's Cookbook
Comment Share
Neagu, Adrian

Contents: 1. Operating system security 2. Securing the network and data in transit 3. Securing data at rest 4. Authentication and user security 5. Beyond privileges: oracle virtual privat database 6. Beyond privileges: oracle label security 7. Beyond privileges: oracle database vault 8. Tracking and analisys: database auditing and analysis: database auditing

Edition
--
ISBN/ISSN
9781849685269
Collation
282 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.74 NEA o
Availability1
Add to basket
MARC DownloadCite
cover
Dasar-dasar manajemen
Comment Share
M. Manullang

Isibuku: Bab 1. Arti, sarana koma dan fungsi manajemen Bab 2. Tokoh-tokoh manajemen Bab 3. Perencanaan Bab 4. Organisasi Bab 5. Departementasi Bab 6. Staff dan panitia Bab 7. Delegasi Bab 8. Memperoleh pegawai Bab 9. Memajukan pegawai Bab 10. Memanfaatkan pegawai Bab 11. Memberi perintah Bab 12. Pengawasan Bab 13. Proses pengawasan Bab 14. Manajemen sumber daya manusia 

Edition
Cetakan kesembilan belas
ISBN/ISSN
9794206288
Collation
xii, 219 hlm.; 20.5 cm
Series Title
null
Call Number
658.1 MAN d
Availability1
Add to basket
MARC DownloadCite
cover
Packet guide to core network protocols
Comment Share
Hartpence, Bruce

Table of Contents Chapter 1 Networking Models What Is a Model? Why Use a Model? OSI Model Introducing TCP/IP Chapter 2 Ethernet Remember the Models Structure Ethernet Type II vs. 802.3 MAC Addresses—Another Look Ethernet Operation Shared Media Physical Layer Encoding Other Types of Signaling Topologies Final Th…

Edition
--
ISBN/ISSN
9781449306533
Collation
xv, 137 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.62 HAR p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?